IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63 White Papers (View All Report Types)
Data Protection and Business Continuity in a Mobile World: A Guide for SMBs
sponsored by Hewlett-Packard Company
WHITE PAPER: This report discusses the specific security challenges that face SMBs and gives advice for how they can keep their data secure with the resources they have.
Posted: 30 Sep 2015 | Published: 30 Jun 2015

Hewlett-Packard Company

Special Report: The Cost of Failed Trust
sponsored by Venafi
WHITE PAPER: This Ponemon report uses recent cybersecurity data to reveal why cryptographic keys and digital certificates are less trustworthy than many organizations believe.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


How Prepared is Your Company to Prevent Downtime and Data Loss?
sponsored by NTT America, Inc.
WHITE PAPER: This informative white paper examines survey results about how prepared organizations are to deal with a disaster affecting ongoing continuity of their business operations. Download now to find out how respondents answered key areas and learn what makes up an effective BCDR plan.
Posted: 21 Sep 2015 | Published: 31 Oct 2014

NTT America, Inc.

Optimize Security Operations with Next-generation MSS
sponsored by IBM
WHITE PAPER: This white paper describes why managed security services are a smart alternative to complex and unwieldy in-house security systems.
Posted: 14 Sep 2015 | Published: 31 Jul 2015


Sluggish Incident Response Report:: Next-Gen Security Problems and Solutions
sponsored by FireEye
WHITE PAPER: Identify the issues plaguing network incident response processes and combat shortcomings like limited human resources. Access this report now to glean an overview of the outside security services that your organization can procure to eliminate sluggish incident response.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


The New Reality of Mac in Business
sponsored by JAMF Software
WHITE PAPER: This resource explores the state of Mac adoption among enterprises. Access and learn how Macs went from being routinely ignored by corporate IT to being widely considered as a good fit for many organizations.
Posted: 06 Oct 2015 | Published: 06 Oct 2015

JAMF Software

Case Study: A Profile of Cyber-Extortion
sponsored by Akamai
WHITE PAPER: This white paper provides an in-depth look at a cyber-extortion group, showing you what their attacks look like and what you can do to stop them.
Posted: 17 Sep 2015 | Published: 09 Sep 2015


Removing the Complexity and Guesswork from Your PKI Refresh
sponsored by Venafi
WHITE PAPER: This white paper discusses the challenges of PKI refresh and their impact on security. Read on to learn how you can bolster security with a simplified and streamlined PKI refresh process.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


Streamline Endpoint Security with the Cloud
sponsored by Trustwave
WHITE PAPER: This white paper explains how putting endpoint security in the cloud can give you effective security that's both affordable and simple.
Posted: 02 Oct 2015 | Published: 31 Dec 2014


Top 10 Disaster Recovery Pitfalls
sponsored by NTT America, Inc.
WHITE PAPER: Access this white paper to uncover ten most common disaster recovery pitfalls and helpful hints to guide you in developing your own disaster recovery plan.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

NTT America, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement